General

  • Target

    93a9b3b4455c1e8469d1e70599f1ba12d103dbf09d9bcaf079a00e0ca55aa72c.exe

  • Size

    748KB

  • Sample

    241009-pq7caayfpc

  • MD5

    08559f3ae9de39bb28d949bd55dbd8de

  • SHA1

    64fded624bee0ba302f7e219398987754037d078

  • SHA256

    93a9b3b4455c1e8469d1e70599f1ba12d103dbf09d9bcaf079a00e0ca55aa72c

  • SHA512

    4ca6bebcf1d3fc8533c4ccf6dab7fc6af67fe762e26fc7939dee1bd6c6db3812eed565aec64620cd0ce8fa1682fbef267b2ac536b8a65f0123bcafd40efda8a9

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLFBfP6r5+7TZocnOnHEo+ySgnnlhYwOAoCDeA:tthEVaPqLFBfPS5+7TZx0Hp+y3nowYCf

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -GN,s*KH{VEhPmo)+f

Targets

    • Target

      93a9b3b4455c1e8469d1e70599f1ba12d103dbf09d9bcaf079a00e0ca55aa72c.exe

    • Size

      748KB

    • MD5

      08559f3ae9de39bb28d949bd55dbd8de

    • SHA1

      64fded624bee0ba302f7e219398987754037d078

    • SHA256

      93a9b3b4455c1e8469d1e70599f1ba12d103dbf09d9bcaf079a00e0ca55aa72c

    • SHA512

      4ca6bebcf1d3fc8533c4ccf6dab7fc6af67fe762e26fc7939dee1bd6c6db3812eed565aec64620cd0ce8fa1682fbef267b2ac536b8a65f0123bcafd40efda8a9

    • SSDEEP

      12288:v6Wq4aaE6KwyF5L0Y2D1PqLFBfP6r5+7TZocnOnHEo+ySgnnlhYwOAoCDeA:tthEVaPqLFBfPS5+7TZx0Hp+y3nowYCf

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks